By Topic

IEEE Transactions on Mobile Computing

Issue 7 • Date July 2010

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (223 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks

    Publication Year: 2010, Page(s):913 - 926
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4336 KB) | HTML iconHTML

    Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. Without an effective and efficient detection mechanism, these re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks

    Publication Year: 2010, Page(s):927 - 940
    Cited by:  Papers (56)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2570 KB) | HTML iconHTML

    In this paper, we propose a solution to the scheduling problem in clustered wireless sensor networks (WSNs). The objective is to provide network-wide optimized time division multiple access (TDMA) schedules that can achieve high power efficiency, zero conflict, and reduced end-to-end delay. To achieve this objective, we first build a nonlinear cross-layer optimization model involving the network, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

    Publication Year: 2010, Page(s):941 - 954
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1900 KB) | HTML iconHTML

    Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio Sleep Mode Optimization in Wireless Sensor Networks

    Publication Year: 2010, Page(s):955 - 968
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2133 KB)

    Energy efficiency is a central challenge in sensor networks, and the radio is a major contributor to overall energy node consumption. Current energy-efficient MAC protocols for sensor networks use a fixed low-power radio mode for putting the radio to sleep. Fixed low-power modes involve an inherent trade-off: deep sleep modes have low current draw and high energy cost and latency for switching the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Cooperative Relaying Schemes in IR-UWB Networks

    Publication Year: 2010, Page(s):969 - 981
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2023 KB) | HTML iconHTML

    Cooperation between wireless nodes to retransmit data for the other users introduces multiuser diversity to a wireless network and increases the system throughput. In this paper, the optimal cooperative relaying strategies in the MAC layer are analyzed while considering the UWB unique properties such as fine ranging and immunity to small scale fading. Specifically, the optimal cooperation strategi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MABS: Multicast Authentication Based on Batch Signature

    Publication Year: 2010, Page(s):982 - 993
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2076 KB) | HTML iconHTML

    Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks

    Publication Year: 2010, Page(s):994 - 1007
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2681 KB) | HTML iconHTML

    Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor's energy consumption, we introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the number of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Power Consumption with QoS Constraints in IEEE 802.16e Wireless Networks

    Publication Year: 2010, Page(s):1008 - 1021
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5021 KB) | HTML iconHTML

    Mobile Broadband Wireless Access (BWA) networks will offer in the forthcoming years multiple and differentiated services to users with high mobility requirements, connecting via portable or wearable devices which rely on the use of batteries by necessity. Since a relatively large fraction of energy is consumed by such devices for transmitting/receiving data over-the-air, mechanisms are needed to r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Assignment for Multihop Cellular Networks: Minimum Delay

    Publication Year: 2010, Page(s):1022 - 1034
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2658 KB) | HTML iconHTML

    Multihop cellular networks (MCNs) enhance the capacity and coverage and alleviate the dead-spot and hot-spot problems of cellular networks. They also allow faster and cheaper deployment of cellular networks. A fundamental issue of these networks is packet delay because multihop relaying for signals is involved. An effective channel assignment is the key to reducing delay. In this paper, we propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertainty Modeling and Reduction in MANETs

    Publication Year: 2010, Page(s):1035 - 1048
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2542 KB) | HTML iconHTML

    Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include uncertainty in the reputation system. Specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Contention Vector Division Multiple Access (D-CVDMA) Protocol for Wireless Networks

    Publication Year: 2010, Page(s):1049 - 1054
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1242 KB) | HTML iconHTML

    Traditional Time Division Multiple Access (TDMA) protocol provides deterministic periodic collision-free data transmissions. However, TDMA lacks flexibility and exhibits low efficiency in dynamic environments such as wireless LANs. On the other hand, contention-based MAC protocols such as the IEEE 802.11 DCF are adaptive to network dynamics but are generally inefficient in heavily loaded or large ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2010, Page(s): 1055
    Request permission for commercial reuse | PDF file iconPDF (270 KB)
    Freely Available from IEEE
  • IEEE Computer Society Computing Now [advertisement]

    Publication Year: 2010, Page(s): 1056
    Request permission for commercial reuse | PDF file iconPDF (402 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (223 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu